A-Z Popular New Security Search »
Information Security
 
Related Guides

What is Data Remanence?

 , updated on
Data remanence are residual representations of data that remain after deleting files or reformatting data storage devices. It is common for operating systems to logically delete files leaving them physically present on a storage device. In theory, it is also possible to recover data that has been sparsely overwritten using techniques such as magnetic force microscopy.
Security practices often call for properly deleting files with wiping or more extensive measures such as degaussing or physical destruction of devices. It is also common to fully encrypt drives to make all files unreadable without a security key.

Feasibility of Recovering Overwritten Data

In theory it is remotely possible to recover data that has been overwritten. For this reason, wiping tools may overwrite data three times often will all zeros, all ones and finishing with a pseudorandom pattern.
Overview: Data Remanence
Type
Definition
Traces of data that remain after deleting, formatting or overwriting data.
Also Known As
Residual Data
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Types of Technology

A reasonably comprehensive list of information technologies.

Gamification

A list of gamification techniques.

Information Technology Problems

A list of common IT problems.

Types Of Cloud

The basic types of cloud computing.

Machine Data

The common types of machine data.

Types Of Software

The common types of software.

Proprietary Technology

A definition of proprietary technology with examples.

Systems Design

The common elements of a systems design.

Systems vs Applications

The difference between systems and applications explained.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map